01410naa a2200193 a 450000100080000000500110000800800410001902000180006010000170007824500710009525000110016626000090017750001020018652007630028865000150105165300150106665300170108177301180109810074792011-04-06 1999 bl uuuu u00u1 u #d a0-471-12845-71 aSCHNEIER, B. aApplied cryptographybprotocols, algorithms, and source code in C. a2. ed. c1999 aRequisitos: Acrobat Reader 3.01 with search. Fonte da versão impressa: [S.l.]: John Wiley, 1996. aCryptographic Protocols. Protocol Building Blocks. Basic Protocols. Intermediate Protocols. Advanced Protocols. Esoteric Protocols. Cryptographic Techniques. Key Length. Key Management. Algorithm Types and Modes. Using Algorithms. Cryptographic Algorithms. Mathematical Background. Data Encryption Standard (DES). Other Block Ciphers. Still Other Block Ciphers. Combining Block Ciphers. Pseudo-Random-Sequence Generators and Stream Ciphers. Other Stream Ciphers and Real Random-Sequence Generators. One-Way Hash Functions. Public-Key Algorithms. Public-Key Digital Signature Algorithms. Identification Schemes. Key-Exchange Algorithms. Special Algorithms for Protocols. The Real World. Example Implementations. Politics. Afterword by Matt Blaze. Source Code. aAlgorithms aAlgoritmos aCriptografia tIn: DR. DOBB'S JOURNAL. Dr. Dobb's essential books on cryptography and security. San Mateo: Miller Freeman, 1999.